You are on page 1of 2

DESIGN THE ASSIGNMENT 1

Buffer and stack overflows, protection circumvention

Abd Alrahman Saleh

STU FIIT
DESIGN THE ASSIGNMENT 2

Buffer and stack overflows, protection circumvention

This assignment solution will focus on discussing buffer and stack structures, as

well as the vulnerabilities that may be produced by misusing them, leading to a potential

attack and exploit for remotely taking over a process's code execution.

The analysis will be performed on applications written in programming languages

that are highly vulnerable to buffer overflow attacks because they lack built-in safeguards

against overwriting or accessing data in memory, despite the fact that some programming

languages have already developed buffer overflow mitigation mechanisms.

To be more specific, I will be using C, C++ on Linux operating system to develop

the vulnerable applications, going through the difference between the bounded,

unbounded and banned functions (from some company’s vision).

Finally, the most often utilized safeguards will be explained, as well as some

secure coding practices.

The targeted protections will be:

1. Address space randomization – ASLR

2. Data execution prevention – DEP

3. Canneries

4. Structured exception handler overwriting protection (SEHOP)*

You might also like